{"id":709,"date":"2022-10-05T20:20:36","date_gmt":"2022-10-05T20:20:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=709"},"modified":"2022-10-05T20:20:36","modified_gmt":"2022-10-05T20:20:36","slug":"tam-quan-trong-cua-an-ninh-mang","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/tam-quan-trong-cua-an-ninh-mang\/","title":{"rendered":"T\u1ea7m quan tr\u1ecdng c\u1ee7a an ninh m\u1ea1ng"},"content":{"rendered":"<p>Xuy\u00ean su\u1ed1t l\u1ecbch s\u1eed, nh\u1eefng ng\u01b0\u1eddi tham gia v\u00e0o c\u00e1c cu\u1ed9c xung \u0111\u1ed9t lu\u00f4n s\u1eed d\u1ee5ng c\u00f4ng ngh\u1ec7 hi\u1ec7n \u0111\u1ea1i nh\u1ea5t \u0111\u1ec3 th\u00fac \u0111\u1ea9y m\u1ee5c \u0111\u00edch c\u1ee7a m\u00ecnh v\u00e0 \u0111\u1ea1t \u0111\u01b0\u1ee3c c\u00e1c m\u1ee5c ti\u00eau c\u1ee5 th\u1ec3. Trong m\u1ed7i cu\u1ed9c chi\u1ebfn, c\u00e1c \u0111\u1ed9t ph\u00e1 \u0111\u00e3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 ch\u1ed1ng l\u1ea1i k\u1ebb th\u00f9 th\u1ef1c t\u1ebf ho\u1eb7c nh\u1eadn th\u1ee9c th\u00f4ng qua nh\u1eefng ti\u1ebfn b\u1ed9 khoa h\u1ecdc.<\/p>\n\n\n\n<p>Ng\u00e0y nay, xung \u0111\u1ed9t kh\u00f4ng c\u00f2n gi\u1edbi h\u1ea1n \u1edf c\u00e1c chi\u1ebfn tr\u01b0\u1eddng truy\u1ec1n th\u1ed1ng n\u1eefa; thay v\u00e0o \u0111\u00f3, ch\u00fang c\u00f3 th\u1ec3 x\u1ea3y ra tr\u00ean internet \u2013 m\u1ed9t k\u1ebb th\u00f9 linh ho\u1ea1t v\u00e0 nhanh nh\u1eb9n. Nh\u1eefng k\u1ebb t\u1ea5n c\u00f4ng m\u1ea1ng hi\u1ec3u r\u1eb1ng x\u00e3 h\u1ed9i c\u1ee7a ch\u00fang ta ph\u1ee5 thu\u1ed9c v\u00e0o th\u1ebf gi\u1edbi s\u1ed1, v\u00e0 n\u1ebfu ch\u00fang c\u00f3 th\u1ec3 l\u00e0m gi\u00e1n \u0111o\u1ea1n v\u00e0 g\u00e2y m\u1ea5t \u1ed5n \u0111\u1ecbnh, ch\u00fang c\u00f3 th\u1ec3 gi\u00e0nh \u0111\u01b0\u1ee3c m\u1ed9t chi\u1ebfn th\u1eafng l\u1edbn ch\u1ec9 b\u1eb1ng m\u1ed9t c\u00fa nh\u1ea5p chu\u1ed9t.<\/p>\n\n\n\n<h2><strong>Con s\u00e2u Stuxnet<\/strong><\/h2>\n\n\n\n<p>Theo c\u00e1c chuy\u00ean gia, Stuxnet \u0111\u00e3 l\u00e0m h\u1ecfng nhi\u1ec1u m\u00e1y ly t\u00e2m t\u1ea1i nh\u00e0 m\u00e1y l\u00e0m gi\u00e0u uranium Natanz c\u1ee7a Iran b\u1eb1ng c\u00e1ch \u0111\u1ed1t ch\u00e1y ch\u00fang. C\u00e1c t\u1ed5 ch\u1ee9c kh\u00e1c \u0111\u00e3 s\u1eeda \u0111\u1ed5i lo\u1ea1i virus n\u00e0y theo th\u1eddi gian, t\u1eadp trung v\u00e0o c\u00e1c m\u00e1y ph\u00e1t \u0111i\u1ec7n, nh\u00e0 m\u00e1y x\u1eed l\u00fd n\u01b0\u1edbc v\u00e0 \u0111\u01b0\u1eddng \u1ed1ng d\u1eabn kh\u00ed.<\/p>\n\n\n\n<p>Stuxnet l\u00e0 m\u1ed9t lo\u1ea1i virus nhi\u1ec1u ph\u1ea7n \u0111\u00e3 x\u00e2m nh\u1eadp v\u00e0o m\u00e1y t\u00ednh Windows, l\u00e2y lan qua \u1ed5 USB v\u00e0 l\u00e0m h\u1ecfng h\u1ec7 th\u1ed1ng \u0111i\u1ec1u khi\u1ec3n c\u00f4ng nghi\u1ec7p. Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i \u0111\u00e3 ki\u1ec3m tra t\u1eebng m\u00e1y b\u1ecb hack \u0111\u1ec3 t\u00ecm d\u1ea5u hi\u1ec7u c\u1ee7a ph\u1ea7n m\u1ec1m Siemens Step 7, m\u00e0 c\u00e1c m\u00e1y c\u00f4ng nghi\u1ec7p c\u00f3 PLC s\u1eed d\u1ee5ng \u0111\u1ec3 t\u1ef1 \u0111\u1ed9ng h\u00f3a v\u00e0 qu\u1ea3n l\u00fd thi\u1ebft b\u1ecb c\u01a1 \u0111i\u1ec7n.<\/p>\n\n\n\n<p>Sau khi ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i ph\u00e1t hi\u1ec7n ra m\u00e1y t\u00ednh PLC, n\u00f3 \u0111\u00e3 t\u1ea3i m\u00e3 m\u1edbi t\u1eeb internet v\u00e0 b\u1eaft \u0111\u1ea7u ph\u00e1t ra c\u00e1c ch\u1ec9 th\u1ecb \u0111\u1ed9c h\u1ea1i cho thi\u1ebft b\u1ecb \u0111i\u1ec1u khi\u1ec3n b\u1eb1ng m\u00e1y t\u00ednh. \u0110\u1ed3ng th\u1eddi, d\u1eef li\u1ec7u gi\u1ea3 m\u1ea1o \u0111\u00e3 \u0111\u01b0\u1ee3c g\u1eedi \u0111\u1ebfn h\u1ec7 th\u1ed1ng \u0111i\u1ec1u khi\u1ec3n. N\u1ebfu kh\u00f4ng \u0111\u01b0\u1ee3c ki\u1ec3m so\u00e1t, \u0111i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 g\u00e2y ra thi\u1ec7t h\u1ea1i nghi\u00eam tr\u1ecdng.<\/p>\n\n\n\n<p>Theo ngu\u1ed3n tin t\u00ecnh b\u00e1o m\u1ea1ng, v\u00e0o n\u0103m 2012, Stuxnet \u0111\u00e3 \u0111\u01b0\u1ee3c t\u1ea3i xu\u1ed1ng h\u1ec7 th\u1ed1ng nh\u00e0 m\u00e1y l\u00e0m gi\u00e0u uranium Natanz. Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i &quot;s\u00e2u&quot; n\u00e0y \u0111\u00e3 x\u00e2m nh\u1eadp v\u00e0o m\u1ea1ng l\u01b0\u1edbi v\u00e0 nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o c\u00e1c m\u00e1y ch\u1ea1y ph\u1ea7n m\u1ec1m Windows \u0111\u1ec3 t\u1ef1 \u0111\u1ed9ng h\u00f3a v\u00e0 qu\u1ea3n l\u00fd thi\u1ebft b\u1ecb c\u01a1 \u0111i\u1ec7n.<\/p>\n\n\n\n<p>Sau khi ho\u00e0n th\u00e0nh vi\u1ec7c \u0111o uranium, virus b\u1eaft \u0111\u1ea7u t\u1ef1 h\u1ee7y v\u00e0 khi\u1ebfn uranium tr\u1edf n\u00ean v\u00f4 d\u1ee5ng.<\/p>\n\n\n\n<p>M\u1ee5c ti\u00eau c\u1ee7a ch\u01b0\u01a1ng tr\u00ecnh l\u00e0 l\u00e0m gi\u1ea3m ch\u1ea5t l\u01b0\u1ee3ng c\u1ee7a uranium, \u0111\u00f3 l\u00e0 l\u00fd do t\u1ea1i sao virus \u0111\u1ea7u ti\u00ean nh\u1eafm v\u00e0o t\u1ed1c \u0111\u1ed9 thi\u1ebft b\u1ecb ly t\u00e2m t\u1ea1i c\u01a1 s\u1edf. Sau \u0111\u00f3, n\u00f3 s\u1ebd xu\u1ea5t hi\u1ec7n b\u00ecnh th\u01b0\u1eddng \u0111\u1ed1i v\u1edbi nh\u1eefng ng\u01b0\u1eddi theo d\u00f5i n\u00f3, d\u1eabn \u0111\u1ebfn &quot;tr\u1ea1ng th\u00e1i \u1ed5n \u0111\u1ecbnh&quot;. S\u1ef1 ph\u00e1 h\u1ee7y c\u1ee7a uranium s\u1ebd ch\u1ec9 \u0111\u01b0\u1ee3c ti\u1ebft l\u1ed9 khi thi\u1ebft b\u1ecb c\u1ee7a c\u01a1 s\u1edf b\u1eaft \u0111\u1ea7u t\u1ef1 h\u1ee7y. V\u00e0o th\u1eddi \u0111i\u1ec3m \u0111\u00f3, Stuxnet s\u1ebd ho\u00e0n th\u00e0nh m\u1ee5c ti\u00eau c\u1ee7a n\u00f3.<\/p>\n\n\n\n<p>Nh\u01b0ng m\u00e3 c\u1ee7a lo\u1ea1i virus n\u00e0y \u0111\u00e3 \u0111\u01b0\u1ee3c c\u00f4ng khai. Nh\u1eefng ng\u01b0\u1eddi kh\u00e1c \u0111\u00e3 s\u1eeda \u0111\u1ed5i n\u00f3 \u0111\u1ec3 nh\u1eafm v\u00e0o c\u00e1c c\u01a1 s\u1edf h\u1ea1 t\u1ea7ng kh\u00e1c, bao g\u1ed3m nh\u00e0 m\u00e1y x\u1eed l\u00fd n\u01b0\u1edbc, \u0111\u01b0\u1eddng \u1ed1ng d\u1eabn kh\u00ed, nh\u00e0 m\u00e1y \u0111i\u1ec7n v\u00e0 m\u1ea1ng l\u01b0\u1edbi truy\u1ec1n th\u00f4ng.<\/p>\n\n\n\n<h2><strong>Trong b\u00f3ng t\u1ed1i: C\u00e1c ng\u00e0nh c\u00f4ng nghi\u1ec7p quan tr\u1ecdng \u0111\u1ed1i m\u1eb7t v\u1edbi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng<\/strong><\/h2>\n\n\n\n<p>Theo <a href=\"https:\/\/www.mcafee.com\/blogs\/enterprise\/in-the-dark-crucial-industries-confront-cyberattacks\/\">McAfee<\/a>, v\u00e0o n\u0103m 2011, c\u00e1c c\u00f4ng ty \u0111\u00e3 ph\u1ea3i thu\u00ea nh\u1eefng c\u1ef1u tin t\u1eb7c v\u00ec h\u1ecd kh\u00f4ng th\u1ec3 t\u00ecm \u0111\u1ee7 ng\u01b0\u1eddi c\u00f3 \u0111\u1ee7 k\u1ef9 n\u0103ng \u0111\u1ec3 b\u1ea3o v\u1ec7 m\u1ea1ng l\u01b0\u1edbi c\u1ee7a h\u1ecd. Trung t\u00e2m Nghi\u00ean c\u1ee9u Chi\u1ebfn l\u01b0\u1ee3c &amp; Qu\u1ed1c t\u1ebf \u0111\u00e3 n\u00eau b\u1eadt nh\u1eefng s\u1ef1 th\u1eadt \u0111\u00e1ng lo ng\u1ea1i sau \u0111\u00e2y:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>T\u1ed1ng ti\u1ec1n l\u00e0 m\u1ed1i \u0111e d\u1ecda m\u1ea1ng ph\u1ed5 bi\u1ebfn nh\u1ea5t m\u00e0 ng\u00e0nh n\u0103ng l\u01b0\u1ee3ng to\u00e0n th\u1ebf gi\u1edbi ph\u1ea3i \u0111\u1ed1i m\u1eb7t.<\/li>\n<li>C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng \u0111\u00e3 nh\u1eafm v\u00e0o kho\u1ea3ng 80% c\u1ee7a c\u00e1c c\u00f4ng ty \u0111i\u1ec7n l\u1ef1c Mexico.<\/li>\n<li>H\u01a1n m\u1ed9t ph\u1ea7n t\u01b0 c\u00e1c nh\u00e0 cung c\u1ea5p n\u0103ng l\u01b0\u1ee3ng tr\u00ean th\u1ebf gi\u1edbi \u0111\u00e3 b\u1ecb t\u1ed1ng ti\u1ec1n.<\/li>\n<li>60% c\u1ee7a c\u00e1c c\u00f4ng ty \u0111i\u1ec7n l\u1ef1c t\u1ea1i \u1ea4n \u0110\u1ed9 \u0111\u00e3 b\u1ecb x\u00e2m nh\u1eadp.<\/li>\n<li>\u201cDuqu\u201d, m\u1ed9t bi\u1ebfn th\u1ec3 c\u1ee7a Stuxnet, \u0111\u00e3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y trong c\u00e1c nh\u00e0 m\u00e1y \u0111i\u1ec7n \u1edf t\u00e1m qu\u1ed1c gia.<\/li>\n<\/ul>\n\n\n\n<h2><strong>Th\u1ebf gi\u1edbi s\u1ed1 l\u00e0 m\u1ed9t chi\u1ebfn tr\u01b0\u1eddng<\/strong><\/h2>\n\n\n\n<p>Trong l\u1ecbch s\u1eed, nh\u1eefng k\u1ebb x\u00e2m l\u01b0\u1ee3c \u0111\u00e3 t\u1ea5n c\u00f4ng c\u00e1c ngu\u1ed3n n\u01b0\u1edbc v\u00e0 th\u1ef1c ph\u1ea9m \u0111\u1ec3 l\u00e0m suy y\u1ebfu k\u1ebb th\u00f9 c\u1ee7a h\u1ecd. V\u00ed d\u1ee5, trong Th\u1ebf chi\u1ebfn II, c\u00e1c ti\u1ec7n \u00edch v\u00e0 th\u00e0nh ph\u1ed1 c\u00f4ng nghi\u1ec7p \u0111\u00e3 b\u1ecb ph\u00e1 h\u1ee7y \u0111\u1ec3 c\u1ea3n tr\u1edf n\u1ed7 l\u1ef1c chi\u1ebfn tranh c\u1ee7a qu\u00e2n \u0111\u1ed9i x\u00e2m l\u01b0\u1ee3c. Nh\u1eefng ph\u01b0\u01a1ng ph\u00e1p n\u00e0y v\u1eabn \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng cho \u0111\u1ebfn ng\u00e0y nay v\u00ec ch\u00fang hi\u1ec7u qu\u1ea3; \u0111\u1ed1i th\u1ee7 c\u1ee7a ch\u00fang ta c\u00f3 th\u1ec3 c\u00e1ch xa h\u00e0ng ng\u00e0n d\u1eb7m sau m\u00e0n h\u00ecnh m\u00e1y t\u00ednh, nh\u01b0ng h\u1ecd v\u1eabn c\u00f3 th\u1ec3 ph\u00e1t \u0111\u1ed9ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng trong th\u1ebf gi\u1edbi th\u1ef1c \u1ea3nh h\u01b0\u1edfng \u0111\u1ebfn t\u1ea5t c\u1ea3 ch\u00fang ta.<\/p>\n\n\n\n<p>Ch\u00fang ta \u0111ang trong chi\u1ebfn tranh v\u00e0 ph\u1ea3i thay \u0111\u1ed5i c\u00e1ch suy ngh\u0129 \u0111\u1ec3 th\u00edch nghi v\u1edbi chi\u1ebfn tr\u01b0\u1eddng m\u1edbi n\u00e0y. B\u1ea5t k\u1ef3 ai trong ch\u00fang ta c\u0169ng c\u00f3 th\u1ec3 l\u00e0 m\u1ee5c ti\u00eau. N\u1ebfu ch\u00fang ta mu\u1ed1n \u0111\u00e1nh b\u1ea1i k\u1ebb th\u00f9, tr\u01b0\u1edbc ti\u00ean ch\u00fang ta ph\u1ea3i hi\u1ec3u b\u1ed1i c\u1ea3nh v\u00e0 lu\u1eadt l\u1ec7 m\u1edbi.<\/p>\n\n\n\n<h2><strong>An ninh m\u1ea1ng quan tr\u1ecdng h\u01a1n bao gi\u1edd h\u1ebft<\/strong><\/h2>\n\n\n\n<p>Nhu c\u1ea7u v\u1ec1 an ninh m\u1ea1ng ch\u01b0a bao gi\u1edd l\u1edbn h\u01a1n th\u1ebf. V\u1edbi s\u1ef1 ra \u0111\u1eddi c\u1ee7a internet, cu\u1ed9c s\u1ed1ng c\u1ee7a ch\u00fang ta ng\u00e0y c\u00e0ng ph\u1ee5 thu\u1ed9c v\u00e0o c\u00f4ng ngh\u1ec7. Ch\u00fang ta d\u1ef1a v\u00e0o m\u00e1y t\u00ednh cho m\u1ecdi th\u1ee9, t\u1eeb giao ti\u1ebfp \u0111\u1ebfn ng\u00e2n h\u00e0ng v\u00e0 gi\u1ea3i tr\u00ed. Nh\u01b0ng s\u1ef1 ph\u1ee5 thu\u1ed9c n\u00e0y ph\u1ea3i tr\u1ea3 gi\u00e1. Khi cu\u1ed9c s\u1ed1ng c\u1ee7a ch\u00fang ta chuy\u1ec3n sang tr\u1ef1c tuy\u1ebfn, ch\u00fang ta tr\u1edf n\u00ean d\u1ec5 b\u1ecb t\u1ea5n c\u00f4ng m\u1ea1ng h\u01a1n.<\/p>\n\n\n\n<p>V\u00e0 nh\u1eefng lo\u1ea1i m\u1ed1i \u0111e d\u1ecda n\u00e0y \u0111ang tr\u1edf n\u00ean ph\u1ed5 bi\u1ebfn h\u01a1n v\u00e0 tinh vi h\u01a1n. Tin t\u1eb7c kh\u00f4ng c\u00f2n h\u00e0i l\u00f2ng v\u1edbi vi\u1ec7c \u0111\u00e1nh c\u1eafp th\u00f4ng tin c\u1ee7a ch\u00fang ta n\u1eefa; gi\u1edd \u0111\u00e2y ch\u00fang mu\u1ed1n ph\u00e1 ho\u1ea1i cu\u1ed9c s\u1ed1ng v\u00e0 n\u1ec1n kinh t\u1ebf c\u1ee7a ch\u00fang ta. V\u00e0o n\u0103m 2017, ch\u00fang ta \u0111\u00e3 ch\u1ee9ng ki\u1ebfn m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng l\u1edbn l\u00e0m t\u00ea li\u1ec7t D\u1ecbch v\u1ee5 Y t\u1ebf Qu\u1ed1c gia c\u1ee7a Anh. Cu\u1ed9c t\u1ea5n c\u00f4ng ransomware WannaCry \u0111\u00e3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c \u0111\u1ec3 tr\u1ea3 l\u1ea1i. Cu\u1ed9c t\u1ea5n c\u00f4ng \u0111\u00e3 g\u00e2y ra s\u1ef1 gi\u00e1n \u0111o\u1ea1n tr\u00ean di\u1ec7n r\u1ed9ng v\u00e0 khi\u1ebfn NHS thi\u1ec7t h\u1ea1i h\u00e0ng tri\u1ec7u b\u1ea3ng Anh.<\/p>\n\n\n\n<p>N\u0103m 2018, ch\u00fang ta \u0111\u00e3 ch\u1ee9ng ki\u1ebfn cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng l\u1edbn nh\u1ea5t trong l\u1ecbch s\u1eed. Virus NotPetya \u0111\u00e3 l\u00e2y nhi\u1ec5m m\u00e1y t\u00ednh tr\u00ean to\u00e0n th\u1ebf gi\u1edbi, g\u00e2y ra thi\u1ec7t h\u1ea1i h\u00e0ng t\u1ef7 \u0111\u00f4 la. Virus \u0111\u00e3 m\u00e3 h\u00f3a d\u1eef li\u1ec7u v\u00e0 y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c, nh\u01b0ng nh\u1eefng k\u1ebb t\u1ea5n c\u00f4ng \u0111\u00e3 kh\u00f4ng cung c\u1ea5p c\u00e1ch gi\u1ea3i m\u00e3 d\u1eef li\u1ec7u. K\u1ebft qu\u1ea3 l\u00e0, nhi\u1ec1u c\u00f4ng ty \u0111\u00e3 m\u1ea5t quy\u1ec1n truy c\u1eadp v\u00e0o d\u1eef li\u1ec7u quan tr\u1ecdng c\u1ee7a h\u1ecd.<\/p>\n\n\n\n<p>Nh\u1eefng cu\u1ed9c t\u1ea5n c\u00f4ng n\u00e0y cho ch\u00fang ta th\u1ea5y r\u1eb1ng ch\u00fang ta d\u1ec5 b\u1ecb t\u1ed5n th\u01b0\u01a1ng. Ch\u00fang c\u0169ng cho ch\u00fang ta th\u1ea5y r\u1eb1ng c\u00e1ch ti\u1ebfp c\u1eadn hi\u1ec7n t\u1ea1i c\u1ee7a ch\u00fang ta \u0111\u1ed1i v\u1edbi an ninh m\u1ea1ng kh\u00f4ng hi\u1ec7u qu\u1ea3. Ch\u00fang ta c\u1ea7n ph\u1ea3i l\u00e0m nhi\u1ec1u h\u01a1n n\u1eefa \u0111\u1ec3 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng.<\/p>\n\n\n\n<p>Ch\u00fang ta c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n nhi\u1ec1u b\u01b0\u1edbc \u0111\u1ec3 c\u1ea3i thi\u1ec7n an ninh m\u1ea1ng, nh\u01b0ng ch\u00fang ta c\u1ea7n b\u1eaft \u0111\u1ea7u b\u1eb1ng m\u1ed9t s\u1ef1 thay \u0111\u1ed5i c\u01a1 b\u1ea3n trong c\u00e1ch ch\u00fang ta ngh\u0129 v\u1ec1 an ninh. Tr\u01b0\u1edbc ti\u00ean, ch\u00fang ta ph\u1ea3i t\u1eeb b\u1ecf quan ni\u1ec7m r\u1eb1ng an ninh l\u00e0 th\u1ee9 c\u00f3 th\u1ec3 \u0111\u1ea1t \u0111\u01b0\u1ee3c ch\u1ec9 b\u1eb1ng c\u00f4ng ngh\u1ec7. C\u00f4ng ngh\u1ec7 r\u1ea5t quan tr\u1ecdng, nh\u01b0ng ch\u01b0a \u0111\u1ee7. Ch\u00fang ta c\u0169ng c\u1ea7n thay \u0111\u1ed5i t\u01b0 duy c\u1ee7a m\u00ecnh.<\/p>\n\n\n\n<h2><strong>Hi\u1ec3u \u0111\u01b0\u1ee3c m\u1ed1i \u0111e d\u1ecda<\/strong><\/h2>\n\n\n\n<p>B\u01b0\u1edbc \u0111\u1ea7u ti\u00ean l\u00e0 hi\u1ec3u m\u1ed1i \u0111e d\u1ecda. Ch\u00fang ta ph\u1ea3i t\u1ef1 gi\u00e1o d\u1ee5c b\u1ea3n th\u00e2n v\u1ec1 b\u1ea3n ch\u1ea5t c\u1ee7a m\u1ed1i \u0111e d\u1ecda v\u00e0 nh\u1eefng ng\u01b0\u1eddi \u0111\u1ee9ng sau n\u00f3. Ch\u00fang ta c\u1ea7n nh\u1eadn th\u1ee9c \u0111\u01b0\u1ee3c c\u00e1c k\u1ef9 thu\u1eadt m\u00e0 ch\u00fang s\u1eed d\u1ee5ng \u0111\u1ec3 t\u1ea5n c\u00f4ng ch\u00fang ta. V\u00e0 ch\u00fang ta c\u1ea7n hi\u1ec3u c\u00e1c l\u1ed7 h\u1ed5ng m\u00e0 ch\u00fang khai th\u00e1c.<\/p>\n\n\n\n<h2><strong>Thay \u0111\u1ed5i t\u01b0 duy c\u1ee7a ch\u00fang ta<\/strong><\/h2>\n\n\n\n<p>B\u01b0\u1edbc th\u1ee9 hai l\u00e0 thay \u0111\u1ed5i t\u01b0 duy c\u1ee7a ch\u00fang ta. Ch\u00fang ta c\u1ea7n ngh\u0129 v\u1ec1 an ninh nh\u01b0 m\u1ed9t qu\u00e1 tr\u00ecnh, kh\u00f4ng ph\u1ea3i l\u00e0 m\u1ed9t s\u1ea3n ph\u1ea9m, v\u00e0 k\u1ebft h\u1ee3p n\u00f3 v\u00e0o m\u1ecdi th\u1ee9 ch\u00fang ta l\u00e0m. N\u00f3i c\u00e1ch kh\u00e1c, ch\u00fang ta c\u1ea7n ch\u1ee7 \u0111\u1ed9ng, kh\u00f4ng ph\u1ea3i ph\u1ea3n \u1ee9ng. V\u00e0 ch\u00fang ta c\u1ea7n c\u00f9ng nhau l\u00e0m vi\u1ec7c \u0111\u1ec3 bi\u1ebfn th\u1ebf gi\u1edbi c\u1ee7a ch\u00fang ta th\u00e0nh m\u1ed9t n\u01a1i an to\u00e0n h\u01a1n.<\/p>\n\n\n\n<h2><strong>H\u00e3y h\u00e0nh \u0111\u1ed9ng<\/strong><\/h2>\n\n\n\n<p>B\u01b0\u1edbc th\u1ee9 ba l\u00e0 h\u00e0nh \u0111\u1ed9ng. Ch\u00fang ta c\u1ea7n th\u1ef1c hi\u1ec7n nh\u1eefng thay \u0111\u1ed5i \u0111\u00e3 n\u00f3i v\u00e0 \u0111\u1ea7u t\u01b0 v\u00e0o an ninh m\u1ea1ng \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o r\u1eb1ng ch\u00fang ta c\u00f3 kh\u1ea3 n\u0103ng \u1ee9ng ph\u00f3 v\u1edbi c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng m\u1ed9t c\u00e1ch nhanh ch\u00f3ng v\u00e0 hi\u1ec7u qu\u1ea3.<\/p>\n\n\n\n<h2><strong>D\u00f2ng cu\u1ed1i c\u00f9ng<\/strong><\/h2>\n\n\n\n<p>An ninh m\u1ea1ng r\u1ea5t quan tr\u1ecdng v\u00ec ch\u00fang ta \u0111ang trong chi\u1ebfn tranh. K\u1ebb th\u00f9 c\u1ee7a ch\u00fang ta nhanh nh\u1eb9n v\u00e0 di chuy\u1ec3n nhanh, v\u00e0 ch\u00fang \u0111ang s\u1eed d\u1ee5ng c\u00f4ng ngh\u1ec7 \u0111\u1ec3 ph\u00e1t \u0111\u1ed9ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng \u1edf quy m\u00f4 m\u00e0 ch\u00fang ta ch\u01b0a t\u1eebng th\u1ea5y tr\u01b0\u1edbc \u0111\u00e2y. Ch\u00fang ta c\u1ea7n thay \u0111\u1ed5i t\u01b0 duy v\u00e0 c\u00e1ch ti\u1ebfp c\u1eadn c\u1ee7a m\u00ecnh \u0111\u1ed1i v\u1edbi an ninh. V\u00e0 ch\u00fang ta c\u1ea7n h\u1ee3p t\u00e1c \u0111\u1ec3 bi\u1ebfn th\u1ebf gi\u1edbi c\u1ee7a ch\u00fang ta th\u00e0nh m\u1ed9t n\u01a1i an to\u00e0n h\u01a1n.<\/p>\n\n\n\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Trong su\u1ed1t l\u1ecbch s\u1eed, nh\u1eefng ng\u01b0\u1eddi tham gia xung \u0111\u1ed9t lu\u00f4n s\u1eed d\u1ee5ng c\u00f4ng ngh\u1ec7 ti\u00ean ti\u1ebfn nh\u1ea5t \u0111\u1ec3 th\u00fac \u0111\u1ea9y m\u1ee5c ti\u00eau c\u1ee7a h\u1ecd v\u00e0 \u0111\u1ea1t \u0111\u01b0\u1ee3c c\u00e1c m\u1ee5c ti\u00eau c\u1ee5 th\u1ec3. Trong m\u1ecdi cu\u1ed9c chi\u1ebfn, nh\u1eefng \u0111\u1ed9t ph\u00e1 \u0111\u00e3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 ch\u1ed1ng l\u1ea1i\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/tam-quan-trong-cua-an-ninh-mang\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">T\u1ea7m quan tr\u1ecdng c\u1ee7a an ninh m\u1ea1ng<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The importance of cyber security | Security Briefing<\/title>\n<meta name=\"description\" content=\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/tam-quan-trong-cua-an-ninh-mang\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The importance of cyber security | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/tam-quan-trong-cua-an-ninh-mang\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T20:20:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"The importance of cyber security\",\"datePublished\":\"2022-10-05T20:20:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"},\"wordCount\":1046,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\",\"name\":\"The importance of cyber security | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"datePublished\":\"2022-10-05T20:20:36+00:00\",\"description\":\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"width\":558,\"height\":500,\"caption\":\"The importance of cyber security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The importance of cyber security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"T\u1ea7m quan tr\u1ecdng c\u1ee7a an ninh m\u1ea1ng | T\u00f3m t\u1eaft An ninh","description":"An ninh m\u1ea1ng quan tr\u1ecdng h\u01a1n bao gi\u1edd h\u1ebft. T\u00ecm hi\u1ec3u l\u00fd do t\u1ea1i sao b\u1ea1n c\u1ea7n coi tr\u1ecdng v\u1ea5n \u0111\u1ec1 b\u1ea3o m\u1eadt tr\u1ef1c tuy\u1ebfn v\u00e0 c\u00e1ch gi\u1eef an to\u00e0n cho b\u1ea3n th\u00e2n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/tam-quan-trong-cua-an-ninh-mang\/","og_locale":"vi_VN","og_type":"article","og_title":"The importance of cyber security | Security Briefing","og_description":"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.","og_url":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/tam-quan-trong-cua-an-ninh-mang\/","og_site_name":"Security Briefing","article_published_time":"2022-10-05T20:20:36+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"security","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"5 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"The importance of cyber security","datePublished":"2022-10-05T20:20:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"},"wordCount":1046,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","articleSection":["cybersecurity"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/","name":"T\u1ea7m quan tr\u1ecdng c\u1ee7a an ninh m\u1ea1ng | T\u00f3m t\u1eaft An ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","datePublished":"2022-10-05T20:20:36+00:00","description":"An ninh m\u1ea1ng quan tr\u1ecdng h\u01a1n bao gi\u1edd h\u1ebft. T\u00ecm hi\u1ec3u l\u00fd do t\u1ea1i sao b\u1ea1n c\u1ea7n coi tr\u1ecdng v\u1ea5n \u0111\u1ec1 b\u1ea3o m\u1eadt tr\u1ef1c tuy\u1ebfn v\u00e0 c\u00e1ch gi\u1eef an to\u00e0n cho b\u1ea3n th\u00e2n.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","width":558,"height":500,"caption":"The importance of cyber security"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"The importance of cyber security"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"b\u1ea3o v\u1ec7","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin l\u00e0 m\u1ed9t bi\u00ean t\u1eadp vi\u00ean c\u1ea5p cao c\u1ee7a Government Technology. Tr\u01b0\u1edbc \u0111\u00e2y c\u00f4 \u0111\u00e3 vi\u1ebft cho PYMNTS v\u00e0 The Bay State Banner, v\u00e0 c\u00f3 b\u1eb1ng C\u1eed nh\u00e2n Ngh\u1ec7 thu\u1eadt s\u00e1ng t\u00e1c c\u1ee7a tr\u01b0\u1eddng Carnegie Mellon. C\u00f4 s\u1ed1ng \u1edf ngo\u1ea1i \u00f4 Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/vi\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=709"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/709\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/998"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}